General
-
Target
259ba80f7c7037230b07879101b44b8f
-
Size
2.9MB
-
Sample
231231-dj3jzaffh3
-
MD5
259ba80f7c7037230b07879101b44b8f
-
SHA1
60863c8b196812a25a3b2d7e250eea68b9651f52
-
SHA256
54904014efdf534953531361ed0aa643ea2d40123aa3afa6e64f22f01e764d1a
-
SHA512
c451af4b9ebfdca65ce61c6f7b88fabc8077b24412470affbd22d3571caf2720e40d2b129e8c204ceb336390276f4ede4bea0cdcccb2dd9ceb49ccc8eadbce75
-
SSDEEP
49152:jP1EgdM40+5ESYQlQuYCo974yluQ3nCyaXyYRq46u2xRypnfdeVwe:tM4v1TU74yMQ3CQ6q46DRypfdeV5
Behavioral task
behavioral1
Sample
259ba80f7c7037230b07879101b44b8f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
259ba80f7c7037230b07879101b44b8f.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
pandastealer
1.11
http://a0565396.xsph.ru
Extracted
pandastealer
�$��
Targets
-
-
Target
259ba80f7c7037230b07879101b44b8f
-
Size
2.9MB
-
MD5
259ba80f7c7037230b07879101b44b8f
-
SHA1
60863c8b196812a25a3b2d7e250eea68b9651f52
-
SHA256
54904014efdf534953531361ed0aa643ea2d40123aa3afa6e64f22f01e764d1a
-
SHA512
c451af4b9ebfdca65ce61c6f7b88fabc8077b24412470affbd22d3571caf2720e40d2b129e8c204ceb336390276f4ede4bea0cdcccb2dd9ceb49ccc8eadbce75
-
SSDEEP
49152:jP1EgdM40+5ESYQlQuYCo974yluQ3nCyaXyYRq46u2xRypnfdeVwe:tM4v1TU74yMQ3CQ6q46DRypfdeV5
Score10/10-
Panda Stealer payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-